Net Fund

LESSON 1.1 98-366 Networking Fundamentals Understand the Concepts of the Internet, Intranet, and Extranet LESSON 1

Views 180 Downloads 0 File size 5MB

Report DMCA / Copyright

DOWNLOAD FILE

Recommend stories

Citation preview

LESSON

1.1

98-366 Networking Fundamentals

Understand the Concepts of the Internet, Intranet, and Extranet

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about: 

The Internet



Intranets



Extranets



VPN



Security Zones



Firewalls

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set: 1.

Discuss how the Internet was created by the US Department of Defense, when the project started, and the impact it has had on society

2.

Discuss the uses of a virtual private network (VPN) and relate sample situations where it is used

LESSON

1.1

98-366 Networking Fundamentals 

In 1962 ARPA opened a computer research program and appointed an MIT scientist named John Licklider to lead it. He had just published his first memorandum on the "Galactic Network" concept ... a futuristic vision where computers would be networked together and would be accessible to everyone.



In October 1969, Internet messaging programs (IMPs) were installed in computers at both UCLA and Stanford. UCLA students would 'login' to Stanford's computer, access its databases and try to send data.

LESSON

1.1

98-366 Networking Fundamentals



The experiment was successful and the fledgling network had come into being



By December 1969 ARPANET comprised four host computers with the addition of research centers in Santa Barbara and Utah



This was the beginning of the Internet

LESSON

1.1

98-366 Networking Fundamentals 

Access to the Internet was now available and it was hypertext document servers and Mosaic, the graphical browser, that became the killer application that made the Internet popular and useful to the general public



This worldwide computer network allows people to communicate and exchange information



The Internet is not owned by any particular company or person

LESSON

1.1

98-366 Networking Fundamentals

Intranet 

A private network based on Internet protocols such as TCP/IP but designed for information management within a company or organization



One of the key advantages of an intranet is the broad availability and use of software applications unique to the needs of a corporation



It is also a computer network and includes some of the same technologies as the Internet

LESSON

1.1

98-366 Networking Fundamentals 

Intranet uses include providing access to software applications; document distribution; software distribution; access to databases; and training



An intranet is so named because it looks like a World Wide Web site and is based on the same technologies, yet is strictly internal and confidential to the organization and is not connected to the Internet proper



Some intranets also offer access to the Internet, but such connections are directed through a firewall that protects the internal network from the external Web

LESSON

1.1

98-366 Networking Fundamentals

Extranet 

An extension of some combination of corporate, public, and private intranet using World Wide Web technology to facilitate communication with the corporation’s suppliers, customers, and associates



An extranet allows customers, suppliers, and business partners to gain limited access to a company’s intranet in order to enhance the speed and efficiency of their business relationship

LESSON

1.1

98-366 Networking Fundamentals

VPN 

Virtual private network are nodes (nodes are a connection point, either a redistribution point or a communication endpoint (some terminal equipment) on a public network



They communicate among themselves using encryption so that their messages are safe from being intercepted by unauthorized users



VPNs operate as if the nodes were connected by private lines. An example would be teachers at home needing limited access to the school district’s intranet would be given VPN software for their personal laptop

LESSON

1.1

98-366 Networking Fundamentals

LESSON

1.1

98-366 Networking Fundamentals

Security Zone 

Business/organization's need for physical and logical boundaries for accessing, controlling, and securing information throughout an organization's network



The security zone contains hidden settings for how Microsoft Windows and Internet Explorer manage unsigned controls



Security changes daily. A must to keep aware of the updates. Check the webcasts where leading security and privacy experts in field discuss the issues.



Microsoft has webcasts covering Security Bulletins, Security Development Lifecycle, Security Intelligence Report, Security Tools, and more

LESSON

1.1

98-366 Networking Fundamentals

Firewall 

A computer system or network firewall is designed to permit authorized communications while blocking unauthorized access



The device is configured to permit or deny computer applications based upon a set of rules and other criteria



Firewalls are technological barriers designed to prevent unauthorized or unwanted communications between computer networks or hosts

LESSON

1.1

98-366 Networking Fundamentals

Discuss how the business would achieve creating security zones through the use of firewalls and VPNs for their intranet and extranets.

LESSON

1.1

98-366 Networking Fundamentals

Class Activity Student Activity 1.1: Comparing Internet, Intranet, Extranet Discuss in groups of three how our subject applies: 1. As an example use the DMV (Department of Motor Vehicles): 

Us as customers (driver’s license renewal & vehicle registration renewal) 



Highway Patrol as suppliers (vehicle ticket information) & as business partners (they request current vehicle registration information) 



DMV extranet & their own intranet

Smog check stations as suppliers (they provide smog certificates direct to DMV) 



Internet

VPN to DMV extranet

Auto dealers as business partners (new car registration) 

VPN to DMV extranet & their own intranet

2. Think and list examples of businesses that would use the same technology

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review 

Work in small groups (3-4 students) to complete the network design activity from Networking Fundamentals Student Activity NetFund_SA_1.1_1 and Student Activity NetFund_SA_1.1_2



If time permits, informally present group designs to the class. Discuss the different designs created.

LE ESSSSOO N N1 . 21_. A1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand the Local Area Networks (LANs)

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about: 

LANs



Perimeter networks



Addressing



Local loopback IPs



An Internet collection

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set: Class Activity 

Two students draw a slip of paper from the box. Arrange yourselves in order at the front of the room. Two more students select numbers and add to the network forming.



The student with number 1: Tell a “secret” to number 2. Continue to pass information from one student to the next until the message reaches the end of the network.



When the last person receives the message, repeat it to the class.



Describe how this process is similar and different to a computer passing information throughout a network.

LESSON

1.1

98-366 Networking Fundamentals

Just as people network and talk to each other and spread information, computers can network and talk to each other and share information.

LESSON

1.1

98-366 Networking Fundamentals

LANs - Local Area Networks 

Computer networks ranging in size from two computers in a home to a few computers in a single office to hundreds or even thousands of devices spread across several buildings.



They function to link computers together and provide shared access to printers, file servers, and other services.

LESSON

1.1

98-366 Networking Fundamentals 

A group of computers and other devices dispersed over a relatively limited area and connected by a communications link that enables any device to interact with any other on the network.



LANs commonly include PCs and shared resources such as laser printers and large hard disks.



The devices on a LAN are known as nodes (individual pieces of equipment.) o

Nodes are connected by wireless and by cables and through which messages are transmitted

LESSON

1.1

98-366 Networking Fundamentals 

LANs in turn may be plugged into larger networks, such as larger LANs or wide area networks (WANs), connecting many computers within an organization to each other and/or to the Internet.



The physical media that connect devices, interfaces on the individual devices that connect to the media, protocols that transmit data across the network, and software that negotiates, interprets, and administers the network and its services are all a part of the LAN.

LESSON

1.1

98-366 Networking Fundamentals

Perimeter Networks 

A perimeter network is a specialized network. Usually a physical subnet outside of the main firewall allowing a business to expose their services to the Internet.

LESSON

1.1

98-366 Networking Fundamentals

Addresses 

A unique identifier is assigned to each node on a network.



A computing address defines a range of discrete addresses:



o

each of which may correspond to a physical or virtual memory register

o

a network host

o

peripheral device, disk sector, or other physical entity.

Just as people have addresses, computer memory and networks have addresses.

LESSON

1.1

98-366 Networking Fundamentals

Reserved address ranges for local use 

Address ranges are reserved by IANA for private intranets, and not routable to the Internet.

The Internet Assigned Numbers Authority (IANA) 

Allocates ranges of numbers to various registries in order to enable them to each manage their particular address space.

LESSON

1.1

98-366 Networking Fundamentals

Local Loopback IPs 

127.0.0.1 is the loopback address in IP



Loopback is a test mechanism of network adapters. Messages sent to 127.0.0.1 do not get delivered to the network.



Instead, the adapter intercepts all loopback messages and returns them to the sending application.



IP applications often use this feature to test the behavior of their network interface.

LESSON

1.1

98-366 Networking Fundamentals

An Internet Connection Sharing 

ICS is a collection of technologies that work together to enable multiple devices on a private network to share a single Internet connection.



Microsoft uses the class C reserved IP range for implementing a SOHO (small office/home office) network—where one computer shares its Internet connection with other computers—similar to Microsoft's printer sharing noted in the video.

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review Complete this review activity on the same paper with the flow chart you used for the applied learning. 1.

Summarize a local area network

2.

Add any questions you have about the lesson

Turn in this paper as your “ticket out the door”

LESSON

1.1

98-366 Networking Fundamentals

Class Activity



Student activity 1.2_A: Local Area Network Components.



View the video shown on the next slide.



Using form SA 1.2_A label the components of the LAN created in the video.

LESSON

1.1

98-366 Networking Fundamentals

LE ESSSSOO N N1 , 21_. B1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand VLANs, Wired LANs, and Wireless LANs

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will review: 

Wired local area networks



Wireless local area networks



Virtual local area networks (VLANs)

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set 

Explain why wireless networks are so popular, especially in homes



Describe the elements that make up a wireless network



What is the opposite of a wireless network?

LESSON

1.1

98-366 Networking Fundamentals

LAN 

A local area network (LAN) is a single broadcast domain. This means the broadcast will be received by every other user on the LAN if a user broadcasts information on his/her LAN. Broadcasts are prevented from leaving a LAN by using a router.

Wired LAN 

An electronic circuit or hardware grouping in which the configuration is determined by the physical interconnection of the components

LESSON

1.1

98-366 Networking Fundamentals

Wireless LAN 

Communications that take place without the use of interconnecting wires or cables, such as by radio, microwave, or infrared light



Wireless networks can be installed: o

o

Peer-to-peer “Ad hoc” mode—wireless devices can communicate with each other "Infrastructure" mode—allows wireless devices to communicate with a central node that can communicate with wired nodes on that LAN

LESSON

1.1

98-366 Networking Fundamentals

Sample example of a wireless LAN design:

LESSON

1.1

98-366 Networking Fundamentals

Wired LANs: Advantages Most wired LANs are built with inexpensive hardware: 1.

Network adapter

2.

Ethernet cables

3.

Hubs

LESSON

1.1

98-366 Networking Fundamentals

Advantages 

Wired LANs provide superior speed and performance

Disadvantages 

Difficult to run cables under the floor or through walls especially when computers sit in different rooms



Require central devices like hubs or routers to accommodate more computers, which can be expensive



Generally it costs less than wireless equipment for the equivalent wired Ethernet products

LESSON

1.1

98-366 Networking Fundamentals

Wireless LANS: Advantages 

Easy access to the Internet in public places



Less expensive to install and maintain



Alleviates the need to run wiring through buildings

Disadvantages 

The data transfer rate will decrease as computers are added



Lower wireless bandwidth means video streaming will be slow



Security is more difficult to guarantee and requires configuration

LESSON

1.1

98-366 Networking Fundamentals

Application of LANs 

Home and small business computer networks can be built using either wired or wireless technology



Large companies are trying to move toward wireless but there are more challenges, especially with security



Wired Ethernet has been the traditional choice in homes, but Wi-Fi wireless technologies are quickly replacing wired LANs

LESSON

1.1

98-366 Networking Fundamentals

VLAN 

A virtual LAN, known as a VLAN, is a group of hosts with a common set of requirements that communicate regardless of their physical location



Sometimes called a “logical network”



Has the same attributes as a physical LAN, but allows for end stations to be grouped together even if they are not located on the same network switch



Network reconfiguration can be done through software

LESSON

1.1

98-366 Networking Fundamentals 

The VLAN controller can change or add workstations and manage load balancing and bandwidth allocation more easily than with a physical picture of the LAN



Network management software keeps track of relating the virtual picture of the local area network with the actual physical picture

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review 1.

2.

Why is a VLAN sometimes referred to as a “logical network”? List the advantages and disadvantages for a wired network and a wireless network. Give examples of a typical uses for each.

LE ESSSSOO N N1 . 31_. A1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand Wide Area Networks (WANs)

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will review: 

Dial-up



Integrated services digital networks (ISDN)



Leased lines



Virtual private networks (VPN)



Wide area networks (WAN)

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set Apply what you have learned about LANs to this lesson. 1.

What have you learned in the past that will help you to understand WANs?

2.

Discuss with your neighbor how you can apply learning from past experience to this new topic of WANs.

LESSON

1.1

98-366 Networking Fundamentals

Dial-up Connections 

A connection that uses the public switched telephone networks rather than a dedicated circuit or some other type of private network.



This is often referred to as plain old telephone service/public switched telephone service (POTS/PSTN).



Remote server access provides two different types of remote access connectivity: o

Dial-up remote access

o

Virtual private network (VPN) remote access

LESSON

1.1

98-366 Networking Fundamentals 

With dial-up remote access, a remote access client uses the telecommunications infrastructure to create a temporary physical circuit or a virtual circuit to a port on a remote access server.



After the physical or virtual circuit is created, the rest of the connection parameters can be negotiated.

LESSON

1.1

98-366 Networking Fundamentals

ISDN - Integrated Services Digital Network 

A high-speed digital communications network evolving from existing telephone services.



Designed to replace the current telephone network



An ISDN communication channel carries voice, circuit, or packet conversations. The B channel is the fundamental component of ISDN interfaces. It carries 64,000 bits per second in either direction.



The most common kind of ISDN interface available in the United States is BRI, which contains two B channels, each with 64-kbps capacity, and a single D channel (16-kbps) that is used for signaling and call progress messages.

LESSON

1.1

98-366 Networking Fundamentals

Leased Lines 

A communications channel that permanently connects two or more locations.



Leased lines are private or dedicated lines, rather than public ones. Also called dedicated connection and private line.



A leased line is a dedicated telephone line rented from the phone company. It provides a 24 hour dedicated connection between two points.



Leased lines can be almost any speed but are typically 2 Mbps. Higher speed lines are more expensive.

LESSON

1.1

98-366 Networking Fundamentals

VPN - Virtual Private Network 

Computer devices (nodes) on a public network that communicate among themselves using encryption technology so that their messages are as safe from being intercepted and understood by unauthorized users as if the nodes were connected by private lines.



VPN client uses an IP (Internet protocol) internetwork to create a virtual point-to-point connection with a remote access server acting as the VPN server.



A server-based computer can be a remote-access server so that other users can connect to it by using VPN, and then access shared files on your local drives or on your network.

LESSON

1.1

98-366 Networking Fundamentals

Basic VPN Requirements 

User Permission. Enable a user to access the VPN



IP Configuration. The VPN server should have a static IP address and assign the arrange of IP addresses to VPN clients.



The VPN server must also be configured with DNS (Domain Name System) and WINS (Windows Internet Name Service) server addresses to assign to the VPN client during the connection



Data Encryption. Data carried on the public network should be rendered unreadable to unauthorized clients on the network

LESSON

1.1

98-366 Networking Fundamentals

Basic VPN Requirements (continued) 

The TCP/IP (transmission control protocol/Internet protocol) is a common protocol used in public networks



Firewall Ports. VPN server behind the firewall requires port implementation



Interface(s) for VPN server. If using a router, only one NIC (network interface controller) is needed. If the network doesn't have a router or the VPN is also a gateway, the computer must have at least two interfaces, one connecting to the Internet and another connecting to the LAN.



One interface for VPN client. The interface can be a dial-in modem, or a dedicated connection to the Internet

LESSON

1.1

98-366 Networking Fundamentals

WAN - Wide Area Network 

Geographically widespread network



Relies on communications capabilities to link the various network segments



Can consist of a number of linked LANs (local area networks) or it can be one large network



Used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations

LESSON

1.1

98-366 Networking Fundamentals

LAN to a Wide Area Network

LESSON

1.1

98-366 Networking Fundamentals

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review 1.

Compare networks and discuss the relationship of a wide area network to a local area network and a virtual private network.

2.

How do leased lines, dial-up, and ISDN relate to wide area networks?

3.

Discuss your answers with two other students and refine your thoughts. Share your answers with the class.

L E SSSSOONN 1 1. 3. B1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understanding Wide Area Networks

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about: 

T1



T3



E1



E3



DSL



Cable and its characteristics (speed, availability)

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set 

Pass sample cables around the class. Share with another student and answer if and where you have seen these cables before.



Review how a LAN would be designed for the classroom. How do you imagine the design for a WAN is different?

LESSON

1.1

98-366 Networking Fundamentals

T1 

A high-speed communications line that can handle digital communications and Internet access at the rate 1.544 Mbps (megabits per second).



This high-bandwidth telephone line can also transmit text and images.



Speed is attained through multiplexing 24 separate 64 Kbps channels into a single data stream.



Commonly used by larger organizations for Internet connectivity.

LESSON

1.1

98-366 Networking Fundamentals

T3 

A T-carrier that can handle 44.736 Mbps (megabits per second) or 672 voice channels.

LESSON

1.1

98-366 Networking Fundamentals

E1 

A 2.048 Mbps point-to-point dedicated, digital circuit provided by the telephone companies in Europe.



The European counterpart of the North American T1 line.



E1 and T1 lines can be interconnected for international use.



Uses two wire pairs (one for transmit, one for receive) and time division multiplexing (TDM) to interleave 32 64Kbps voice or data channels.

LESSON

1.1

98-366 Networking Fundamentals

E3 

A carrier service with capacity for 34.368 Mbps



The E3 lines is the European counterpart to the US T3



Europe has a counterpart for every T-carrier leased line capability



A speed capacity of 34.368 Mbps o



Interesting since E1 is faster than a T1 and E2 is faster than a T2 but E3 is slower than a T3

E2 through E5 lines provide multiple E1 channels

LESSON

1.1

98-366 Networking Fundamentals

DSL - Digital Subscriber Line 

Provides high-speed transmissions over standard copper telephone wiring



The data throughput of consumer DSL services ranges from 384 Kbps to 20 Mbps in the direction to the customer o



Depends upon technology, line conditions, and service-level.

The data throughput in the reverse direction—from customer to the service provider—is lower o

Asymmetric digital subscriber line (ADSL) is the most common DSL service provided but still with limited availability

o

Symmetric digital subscriber line (SDSL) provides equal speed in both directions

LESSON

1.1

98-366 Networking Fundamentals

Cable Internet Access through CATV 

Has become a viable alternative and many cable companies are offering both a home and a businessclass connection.

LESSON

1.1

98-366 Networking Fundamentals

Reflection – Class Activity 1.

With a partner discuss the similarities and differences between T1, T3, E1, E3.

2.

Create a table showing the similarities and differences.

3.

Indentify North American (T-carrier) and European (Ecarrier).

4.

Include such items as number of lines, number of channels, & max data rate.

5.

Discuss why such ranges exist and describe situations that would require the various options.

LESSON

1.4 1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand Wireless Networking

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about:

Wireless networking  Wireless networking standards and their characteristics  802.11a, b, g, n including different GHz ranges  Types of network security oWPA oWEP o802.1X  Point-to-point (P2P) wireless  Wireless bridging  Gigahertz

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set 1.

Make a list of all the wireless devices they have seen, used, or are familiar with. Answer the following questions relating to the devices in the list.

a.

How do they transmit and communicate with other devices?

b.

It is likely that there are many wireless devices in the same room or area. How are they able to not interfere with each other ? Or do they interfere with each other?

2.

Discuss the uses and security issues of these items

LESSON

1.1

98-366 Networking Fundamentals

Wireless Telecommunications 

Computer networks created without wires such as a local area network (LAN)



The telecommunications network employ interconnections between nodes implemented without the use of wires



Wireless telecommunications networks are accomplished with some type of remote information transmission system

LESSON

1.1

98-366 Networking Fundamentals

Wireless Telecommunications (continued) 

This implementation takes place at the physical level or "layer" of the network where the waves are like radio waves.



Waveform refers to the shape and form of a carrier signal such as a radio wave. A wave is a disturbance that travels through space and time moving in a solid, liquid, or gaseous medium.



This carrier signal uses the same basic protocol as a modulating signal.

LESSON

1.1

98-366 Networking Fundamentals

Electromagnetic Waves 

The wave, or "disturbance," is invisible and is called the force field.



Without these charged particles, there can be no electric force fields and thus no electromagnetic waves.



Examples include light, microwaves, X-rays, and TV and radio transmissions are all kinds of electromagnetic waves.



Negative electrons and positive protons charges cause each other to move.



Positive charge exerts an attractive force on electrons—an electric force.



The velocity makes no difference, the pull or force depends only upon where you put it.



Electronic devices make use of the range of the electromagnetic spectrum.

LESSON

1.1

98-366 Networking Fundamentals

Wireless 

Describes communications in which electromagnetic waves or RF carry a signal over the entire communication path.



The frequencies that are available for use for communication are a public resource and are regulated by the Federal Communications Commission in the U.S.

LESSON

1.1

98-366 Networking Fundamentals

Electronic Modulation 

The process of varying one or more properties of a high-frequency periodic waveform.



In wireless we first take a signal, like a telephone conversation, and then impress it on a constant radio wave called a carrier.



It modulates a constant frequency in the radio range, which we can't hear.



Modulation makes voice band and radio band frequencies work together.



Different modulation techniques, such as AM and FM, are different ways to shape or form electromagnetic radio waves.

LESSON

1.1

98-366 Networking Fundamentals

Electronic Modulation (continued) 

Wireless network technologies are used in phones, laptop computers, automobiles, and public transportation.



High-speed wireless Internet connection services designed to be used from arbitrary locations refers to "mobile broadband.”



Wi-Fi hotspots provides connectivity over a limited radius around fixed wireless access points.



The data rate of a computer network connection is measured in units of bits per second (bps).



One Mbps equals one megabyte per second.



Network equipment makers rate their products using related, larger units of Kbps, Mbps, and Gbps.



Network outages happen due to limits of the service provider coverage area or obstructions from geography, or even inside larger buildings.

LESSON

1.1

98-366 Networking Fundamentals

Institute of Electrical and Electronics Engineers (IEEE) 

Creates standards to ensure compatibility.



The IEEE created the 802 project to develop the standards which are used today. There have been many changes and additions.



IEEE 802 standards define only certain technologies.



Most important IEEE 802 standards is the 802.11, wireless networks—it defines standards for wireless LAN communication.



IEEE 802.11 is a set of standards carrying out wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands.



The base current version of the standard is IEEE 802.11-2007. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802).

LESSON

1.1

98-366 Networking Fundamentals

Popular Protocols Defined by the 802.11b and 802.11g 

802.11-1997 was the first wireless networking standard.



802.11b was the first widely accepted one, followed by



802.11g and then by 802.11n.



802.11n is a new multistreaming modulation technique.



The 802.11 family includes over-the-air modulation, which means to change or vary.

LESSON

1.1

98-366 Networking Fundamentals 

802.11b and 802.11g use the 2.4 GHz ISM band (industrial, scientific and medical), operating in the United States under Part 15 of the US Federal Communications Commission Rules and Regulations.



Gigahertz is a measure of frequency.



Frequency (temporal frequency ) is the number of occurrences of a repeating event per unit time.



The duration of one cycle in a repeating event, so the period is the reciprocal of the frequency.



Because of this choice of frequency band, 802.11b and g equipment may occasionally suffer interference from microwaves , cordless telephones and Bluetooth devices.

LESSON

1.1

98-366 Networking Fundamentals 

Both 802.11 and Bluetooth control their interference by using spread spectrum modulation.



Bluetooth uses a frequency hopping signaling method, while 802.11b and 802.11g use the direct sequence spread spectrum signaling and orthogonal frequency division multiplexing methods, respectively.



802.11a uses the 5 GHz U-NII (Unlicensed National Information Infrastructure) band, which offers at least 19 non-overlapping channels rather than the 3 offered in the 2.4 GHz ISM frequency band.



Depending on the environment, channels may have better or worse performance with higher or lower frequencies.

LESSON

1.1

98-366 Networking Fundamentals

WEP and WPA 

Wireless security protocols widely used by wireless networking devices



WEP—Wired Equivalent Privacy or Weak Encryption Protocol o



Designed to provide equivalent level of security as a wired network

WPA—Wi-Fi Protected Access (WPA and WPA2) o

A certification program to designate compliance with the security protocol to secure wireless computer networks

o

Implements the majority of the IEEE 802.11i standard



The Wi-Fi Alliance intended WPA as an intermediate measure to take the place of WEP pending the preparation of 802.11i



IEEE 802.11 wireless networks are NOT secured by WEP as it is easily broken

LESSON

1.1

98-366 Networking Fundamentals

Wireless Security 

Wireless network messages are more susceptible to eavesdropping than wired networks.



A WEP key uses a passphrase – a security code that is produced using this protocol that allows computers to hide the contents of the messages from intruders and exchange coded messages.



WPA-PSK (Pre-Shared Key) mode provides strong encryption protection without the enterprise authentication server and is the easiest way to deploy WPA to home wireless network using a passphrase.



WPA uses Temporal Key Integrity Protocol (TKIP) to produce unique encryption keys and automatic rekey each wireless clients from passphrase and network SSID.

LESSON

1.1

98-366 Networking Fundamentals

Wireless Bridging A bridge is used to connect two network segments.

LESSON

1.1

98-366 Networking Fundamentals

Bridging 

A forwarding technique used in packet-switched computer networks.



Can be done wired or wireless and used only in LANs.



Bridging depends on flooding and examination of source addresses in received packet headers to locate unknown devices.



A network bridge connects multiple network segments at the data link layer (Layer 2) of the (OSI) Open System Interconnection model.



A switch is a bridge with numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge.

LESSON

1.1

98-366 Networking Fundamentals

Bridging (continued) 

Another form of bridging, source route bridging, was developed for token ring networks.



The main purpose of wireless bridging is to connect a wired Ethernet network segment to a wireless Ethernet network segment .



This is most commonly found in a home wireless router that has a built-in multiport switch for wired devices, and a wireless networking WAN connection for DSL or cable for Internet access.

LESSON

1.1

98-366 Networking Fundamentals

Point-to-Point Protocol (PPP) 

A data link protocol commonly used to establish a direct connection between two networking nodes



Provides compression, transmission encryption privacy, and connection authentication



Used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic links such as links



Internet service providers (ISPs) use PPP for customers’ dial-up access.



Internet service providers (ISPs) use two encapsulated forms of PPP to connect Digital Subscriber Line (DSL) Internet service.  Point-to-Point Protocol over Ethernet (PPPoE)  Point-to-Point Protocol over ATM (PPPoA)

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review 

Compare WEP and WPA by creating a list of the advantages and disadvantages of each



Discuss the various wireless transmission methods

LESSON

1.5 1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand Network Topologies and Access Methods

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about: Network

topologies and access methods

Star

Mesh Bus Ring

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set We previously discussed networks such as local area networks and this leads to the topic of topology—how the network is structured. 1.

Draw a network that includes: 3 computers , 2 desktops and a laptop, and a network printer.

2.

Be prepared to show your drawing and tell what network topology is being used.

LESSON

1.1

98-366 Networking Fundamentals

Class Activity Use the mind map during the PowerPoint presentation to record information about the different types of network topologies. Be sure to include information about which topology types are appropriate for various situations.

LESSON

1.1

98-366 Networking Fundamentals

Network Topologies 

The interconnection of the various elements (links, nodes, etc.) of computer equipment



Network Topologies can be physical or logical



Topology is the virtual shape or structure of a network, which does not need to correspond to the actual physical design of the devices on the computer network.



The physical design of a network including the devices, location, and cable installation is known as physical topology.



How data actually transfer in a network, as opposed to its physical design, is the logical topology, also called signal topology.

LESSON

1.1

98-366 Networking Fundamentals

Compare the logical and physical topology of the star If a hub is used, then the topology is a physical star and a logical bus. If switch is used, then the topology is a physical star and a logical star.

If IBM MAU is used, then the topology is a physical star and a logical ring.

LESSON

1.1

98-366 Networking Fundamentals

Star Network 

The topology structure of a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages.



The hub and leaf nodes, and the transmission lines between them, form a graph with the topology of a star.



An active star network has an active central node that usually has the means to prevent echo-related problems.

LESSON

1.1

98-366 Networking Fundamentals 

By connecting all of the systems to a central node, the star topology reduces the chance of network failure.



The central hub rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network when applied to a bus-based network.



All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only.



Isolation of a peripheral node from all others occurs when there is a failure of a transmission, but the rest of the systems will be unaffected.



Each node (file servers, workstations, and peripherals) is designed to be connected directly to a central network hub, switch, or concentrator.

LESSON

1.1

98-366 Networking Fundamentals 

Data on a star network passes through the hub, switch, or concentrator before continuing to its destination.



The functions of the network are controlled and managed by the hub, switch, or concentrator, and it acts as a repeater.



The twisted pair cable is the most often used although it can be used with coaxial cable or optical fiber cable.

LESSON

1.1

98-366 Networking Fundamentals

Mesh Networks 

Each node in the network acts as an independent router.



A mesh network whose nodes are all connected to each other is a fully connected network.



The component parts connect to each other via multiple hops.



Is self-healing and can still operate when one node breaks down or a connection goes bad



Considered more reliable than other networks



Mobile ad hoc networks (MANET) must deal with the problems of the mobility of the nodes. Mesh networks do not have this problem but they are closely related with the MANET network.

LESSON

1.1

98-366 Networking Fundamentals 

Originally developed for military applications



Wireless networks are typical of mesh architectures.



The mesh network can support multiple functions such as client access, backhaul service, and scanning in mobile applications.



Increased power has enabled the mesh nodes to become more modular.



One node or device can contain multiple radio cards or modules, allowing the nodes to be customized to handle a unique set of functions and frequency bands.



Game theory methods that analyze strategies for the allocation of resources and routing of packets have aided mesh networks.

LESSON

1.1

98-366 Networking Fundamentals

Ring Network 

Data travels from node to node, with each node along the way handling every packet.



It forms a single continuous pathway for signals through each node.



May be disrupted by the failure of a single link



A node failure or cable break might isolate every node attached to the ring.



Each machine or computer has a unique address that is used for identification purposes.



Only one machine can transmit on the network at a time.

LESSON

1.1

98-366 Networking Fundamentals 

Even though computers on a home network can be arranged in a circle shape, it does not mean that it presents a ring topology.



By sending data on a counter clockwise ring FDDI (fiber distributed data interface) networks circumvent a node failure or cable break.



802.5 networks, also known as Token Ring networks, avoid the weakness of a ring topology altogether. o



They actually use a star topology at the physical layer and a multistation access unit (MAU) to imitate a ring at the data-link layer.

The signal can be boosted or repeated as the computers connected to the ring act to strengthen the signals that transverse the network.

LESSON

1.1

98-366 Networking Fundamentals

Bus Network 

A shared communications line



A common backbone to connect all devices that operates and functions as a shared communication medium



A single cable that devices attach or tap into with an interface connector



Communicates by sending a broadcast message onto the wire for all other devices to see, but only the intended recipient actually accepts and processes the message.



Devices on the bus must first determine that no other device is sending a packet on the cable before any device can send a packet.

LESSON

1.1

98-366 Networking Fundamentals 

Bus mastering is supported by many bus architectures that enable a device connected to the bus to initiate transactions.



Devices with Ethernet communicate like they were in chat room, which is called carrier sense multiple access/ collision detection (CSMA/CD).



Two packets are sometimes sent (two cards talk) at the same time.



The cards arbitrate on their own to decide which one will resend its packet first when this collision occurs.



All PCs share the data transfer capacity of that bandwidth (wire ) if they are on a bus network.

LESSON

1.1

98-366 Networking Fundamentals

Advantages of a Bus Network 

Easy to implement and extend



Well-suited for temporary or small networks not requiring high speeds (quick and easy setup)



Cost effective; only a single cable is used



Cheaper than other topologies



Easy identification of cable faults

LESSON

1.1

98-366 Networking Fundamentals

Disadvantages of Bus Networks 

Limited cable length and number of stations



Only one packet can remain on the bus during one clock pulse



If there is a problem with the cable, the entire network breaks down.



Performance degrades as additional computers are added or with heavy traffic



Slower data transfer rate than other topologies



It works best with limited number of nodes

LESSON

1.1

98-366 Networking Fundamentals

Hybrid Network 

When a combination of two or more topologies are connected



If two star networks were connected together, they would exhibit a hybrid network topology. o

A star ring network would be two or more star topologies linked together using a multistation access unit (MAU) as a centralized hub.

LESSON

1.1

98-366 Networking Fundamentals 

Two or more star topologies connected using a bus trunk would be a star-bus network.



A multi-station access unit (MSAU) connects a group of computers to a token ring local area network.

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review 

Use the Student Activity brain map document



Work in small groups (3–4 students) to discuss the completed brain map



Select a presenter to tell about the network topology applications which your group decided was appropriate for various scenarios



Share one scenario and describe how the topology your group selected is ideal for this scenario

LE ESSSSOO N N2 . 11_. A1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand Switches

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about: 

Switches



Transmission speeds



Data transmission



Cables



Uplink speeds



Managed and unmanaged switches



VLANs

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set 

A traditional light switch control has only 2 settings—on or off. A dimmer switch control allows for variations of light intensity. Think about these two variations of controls and what you have already learned about network hubs and switches. Explain what you think the difference is between a network hub and switch.



Form groups of three to discuss your answers.

LESSON

1.1

98-366 Networking Fundamentals

Switches 

A computer networking device that connects network segments



Some make it possible to connect different types of networks, including Ethernet, fiber channel, ATM, ITU-T G.hn and 802.11.

LESSON

1.1

98-366 Networking Fundamentals 

Layer 2 switches are network bridges that process and route data at the data link layer (layer 2) of the OSI model.



Layer 3 switches (multilayer) process data at the network layer of 3 and above.



Layer 4 switches allows for policy-based switching and are based on the OSI "transport" layer. These switches limit different types of traffic on specific end-user switch ports. o

The Layer 4 network switch does not work with unintelligent or passive network devices such as hubs and repeaters.

LESSON

1.1

98-366 Networking Fundamentals

Open System Interconnection (OSI) 

A way of subdividing a communications system into smaller parts (called layers)



Layers are defined when services are provided to the layer above it and receive services from the layer below it.



On each layer an “instance” provides services to the instances at the layer above and requests service from the layer below.



A repeater is an electronic device that receives a signal and retransmits it to the other side of an obstruction or to a higher level or at a higher power so that the signal can cover greater distances.

LESSON

1.1

98-366 Networking Fundamentals

Transmission speed 

Data are moved across a communications channel at different rates.



The rate is referred to as the bandwidth.

LESSON

1.1

98-366 Networking Fundamentals

Data Transmission 

A standard 10/100 Ethernet switch operates at the data-link layer of the OSI model to create a different collision domain for each switch port.



Ethernet is a family of frame-based computer networking technologies for local area networks.



In the Ethernet networking protocol a collision domain is a physical network segment where data packets can "collide" with one another when being sent.

LESSON

1.1

98-366 Networking Fundamentals 

A network collision is where one particular device sends a packet on a network segment, forcing every other device on that same segment to pay attention to it.



The hub runs in half duplex sharing bandwidth, resulting in collisions, which would then necessitate retransmissions. o



A half duplex is a system where only one device can talk to another at one time—they take turns talking.

Using a switch is called microsegmentation. o

Allows for dedicated bandwidth with every computer on point-topoint connections

o

Can run in full duplex with no collisions

LESSON

1.1

98-366 Networking Fundamentals

Cables 

A straight-through cable has identical ends.



A crossover cable has different ends.



A PC can be connected to an uplink port with a crossover cable and to a regular port with a straight-through cable.

LESSON

1.1

98-366 Networking Fundamentals

Uplink Speeds 

Ethernet standards on uplink speeds are of 10Mbps, 100Mbps, 1000 Mbps/1Gbps, 10Gbps since switches come with autosensing in various combinations.



The access switch members have an uplink module installed. o



There are two ports on each uplink module.

The uplinks are configured to act as trunk ports by connecting the access switch with the distribution switch.

LESSON

1.1

98-366 Networking Fundamentals

Managed and Unmanaged Switches 

An unmanaged switch is also called “dumb”—it allows all traffic to go through the network and the administrator has no control.



The system administrator can take control of the network with a managed switch and allow ports to talk to other ports or none at all.



The switch's benefits over a hub include full bandwidth to each port and methods to deal with collisions.



The ports are allowed to talk to the print server or the personal computers.



A managed switch has its own IP address, and has a telnet and maybe a web-based interface to monitor and secure access to each port on the switch.



A managed switch can also be used to enable or disable specific ports without unplugging a cable.

LESSON

1.1

98-366 Networking Fundamentals 

A managed switch can have virtual LANS (VLANs), which separate ports on a switch into different switches.



A managed switch can tell you about excessive usage on certain ports.



A managed switch can be used to limit the number of IP addresses that one port can service.

LESSON

1.1

98-366 Networking Fundamentals

Virtual LAN (VLAN) 

Allows a separate logical network connectivity from a physical connectivity



Not limited by its physical connectivity



All users belong to a single broadcast domain and can communicate with each other at the data link layer or “layer 2.”



Can be used to segment a complex network into smaller units for better manageability, improved performance, and security



The ability to move is much simpler because of the dynamic nature of VLANs—no physical changes to network topology are necessary.



Security domains can be constructed to provide various levels of security in the network.

LESSON

1.1

98-366 Networking Fundamentals Virtual LAN using VLANs to create broadcast domains across switches

LESSON

1.1

98-366 Networking Fundamentals

Hubs vs. Switches 

A hub is like an ordinary junction box and just passes along what it receives to all the other ports (connections) on the hub.



A switch is more intelligent and is selective about where it passes data. o

It learns where certain equipment is located and passes along the data only to the ports that need to receive it, allowing multiple interactions at once.

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review Directions to the student: 1.

Complete NetFund_SA_2.1A

LE ESSSSOO N N2 . 11_. B1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand Switches

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about: Switches

Backplane Hardware

speed

redundancy

Layer

2 and layer 3 switches

MAC

table

Security

options

Switching

types

Support Capabilities

of hubs vs. switches

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set Recall what you learned about networking and switches. 1.

Explain when you would use a hub rather than a switch

2.

List reasons for using an unmanaged switch

Form a group of three and discuss your responses

LESSON

1.1

98-366 Networking Fundamentals

Switches 

A switch is a network bridge that processes and routes data at the data link layer (layer 2) of the OSI model.



Large switches have higher layer issues, router issues, backplanes, security and redundancy.



Built-in or modular interfaces in large switches make it possible to connect different types of networks, including Ethernet, Fiber Channel, ATM, ITU-T G.hn and 802.11.

LESSON

1.1

98-366 Networking Fundamentals

Layer 2 Switch 

Provides the same functionality as bridges



Learns and forwards frames on each port just like a multiport bridge



Multiple switching paths inside the switch can be active at the same time.



Operates utilizing MAC addresses in its caching table to quickly pass information from port to port.

LESSON

1.1

98-366 Networking Fundamentals

LESSON

1.1

98-366 Networking Fundamentals

Layer 3 Switch 

Utilizes IP addresses to perform the functions as layer 2 switches



Are fast routers that do layer 3 forwarding in hardware



Because IP is the most common among all layer 3 protocols today, most of the layer 3 switches perform IP switching at the hardware level and forward the other protocols at layer 2 (bridge them).

LESSON

1.1

98-366 Networking Fundamentals

Bridging 

Involves segmentation of local-area networks (LANs) at the Layer 2 level



A multiport bridge learns about the media access control (MAC) addresses on each of its ports and transparently passes MAC frames destined to those ports.



Ensures that frames destined for MAC addresses that lie on the same port as the originating station are not forwarded to the other ports

LESSON

1.1

98-366 Networking Fundamentals

Switch Security 

Define virtual local area networks



Two basic steps: 1.

Defining what users can see

2.

Defining where they can connect



What you see—Security allows organizations to separate sensitive clusters of systems from the rest of the network.



What you connect—Port security is available on business-class switches and some allow in-depth settings.

LESSON

1.1

98-366 Networking Fundamentals

Hardware Redundancy 

Occurs when segment C is added to the network connecting switches A and C



If one of the switches fails, the network will eliminate the point of failure.

LESSON

1.1

98-366 Networking Fundamentals

Managed Switches 



Provide support for the network through: o

Flexibility

o

Security

o

Reliability

o

Expandability

Switches are supported by their manufacturer and with online manuals.

LESSON

1.1

98-366 Networking Fundamentals

Three Types of Switching 

Circuit



Packet



Cell Relay

Circuit switching 

Used in voice networks



Not an efficient method for routing any kind of data



Is wasted because no transmission is using the bandwidth of the circuit 100 percent of the time



In circuit failure during a transmission, the entire connection must be re-established, which means the conversation must start over again.

LESSON

1.1

98-366 Networking Fundamentals

Packet Switching 

Used in data networks



Has no dedicated circuits



Each circuit carries many transmissions at the same time.



Has the ability to route data units over any route



More reliable because if a particular circuit in the network should fail, the routers in the network route data units over different circuits.



The protocols have the ability to reassemble the data units into their proper order.

LESSON

1.1

98-366 Networking Fundamentals

Switching Principles 

Cell relay



Voice



Data transmission



The cell is the data unit.



Voice requires small data units.



o

In order to support voice, the data units must be small so that they can be processed quickly and sent through the network with minimal delay.

o

Whenever there is information to be transmitted, the switch simply sends the data units.

Data favors large data units.

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review 1.

Why it is preferable to use a switch rather than a hub?

2.

List reasons for using a managed switch versus an unmanaged switch.

LESSON

21 . 2 1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand Routers

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about: 

Directly connected static routes



Dynamic routes (routing protocols)



Default routes, NAT, RRAS



Routing tables



Routing protocol



Routing in Windows Server



Transmission speed considerations

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set 

Be creative and think about what a “route” means to you and what controls your route through life. There is probably a router telling you what to do such as a traffic light that tells you to go, slow down, or stop.



Give other examples of routers and their applications that you have encountered



Share your answers with two others. Does everyone have router experiences?



Begin brainstorming how you would use a router in the computer industry

LESSON

1.1

98-366 Networking Fundamentals

Routers 

A device that selectively interchanges packets of data in two or more computer networks while connecting the networks



Connected to at least two networks, generally two LANs or WANs or a LAN and its ISP's network



Wireless routers provide everything that a wired router provides, including ports for Ethernet connections and the attributes for wireless security such as Wi-Fi Protected Access (WPA) and wireless MAC address filtering.



Many wireless routers can be configured for "invisible mode" so that your wireless network cannot be scanned by outside wireless clients.

LESSON

1.1

98-366 Networking Fundamentals 

Data can be transmitted through the router from place to place at a measured kilobits transmission speed called the bandwidth .



Each interface on a router will impact overall performance, especially WAN connections.



Data rate and data speed are the same in terms of transmission speed.



Compared to data transmission, bandwidth or "capacity" means how wide the pipe is and how quickly the bits can be sent.



These "speeds" are aggregate speeds. The data on the multiple signal channels are assigned by channel for different uses.



Data transmission speed (or bandwidth) is measured in kilobits, 1,000s of bits per second, or megabits, Mbps, millions of bits per second.



Because of software and protocols, actual transfers are considerably lower.

LESSON

1.1

98-366 Networking Fundamentals

Routing 

A routing protocol is applied when passing data from one subnet (interface) to another subnet.



When determining which route is preferable, directly connected networks have the highest priority, followed by static routes, and then other routes.



If a corresponding interface command is contained under the router configuration stanza of that protocol, it is are advertised by IGP routing protocols, which are directly connected networks.



IGP—Interior gateway protocol describes the fact that each system on the Internet can choose its own routing protocol.

LESSON

1.1

98-366 Networking Fundamentals

Static Routing 

The process of manually entering routes into the routing table through a configuration file that is loaded when the routing device starts up



Static routes are manually configured and cached when a router starts up and don’t change unless a user changes them.



Static routing does not handle down connections well because they must be reconfigured manually to repair any lost connectivity.



Does not work well when the routing information has to be changed or needs to be configured on a large number of routing devices.

LESSON

1.1

98-366 Networking Fundamentals

Dynamic Routing Protocols 

Software applications that dynamically discover network destinations and how to get to them



Have the ability to adapt to logical network topology changes, equipment failures, or network outages.

1.

A router will “learn” routes to all directly connected networks first.

2.

Secondly it will learn routes from other routers that run the same routing protocol.

3.

Next the router sorts through its list of routes and selects one or more “best” routes for each network destination it knows or has learned.

4.

Finally, dynamic protocols will distribute this “best route” information to other routers running the same routing protocol.

LESSON

1.1

98-366 Networking Fundamentals

Routing Table 

Routing Information Base (RIB) is an electronic table (file) or that is stored in a networked computer or a router.



The routes to network destinations are stored in the routing table.



The function of the routing protocols and static routes is to create the routing tables.



The most specific route to the destination IP address is the longest matching route.



The router uses the lowest metric to select the best route when multiples occur.



The router is free to choose which table entry to use if multiple entries exist that are the longest match and the lowest metric.

LESSON

1.1

98-366 Networking Fundamentals 

TCP/IP network routers use the routing table to calculate the destinations of messages it is responsible for forwarding.



A computer must have an IP address to communicate with other computers and servers on the Internet.



An IP address (Internet protocol) is a unique 32-bit number that identifies the location of your computer on a network.



With the growth of the Internet and increased use, the number of available IP addresses is not enough—redesign for the address format to allow for more possible addresses is being developed (IPv6) and it will require modification of the entire infrastructure of the Internet.

LESSON

1.1

98-366 Networking Fundamentals



The network address translation (NAT) is the process of modifying network address information while in transit across a traffic routing device.

LESSON

1.1

98-366 Networking Fundamentals

Routing and Remote Access in Windows Server 

Routing and remote access service (RRAS) in Windows Server supports remote user or site-to-site connectivity.



RRAS is an open platform for routing and networking.



By using secure VPN connections, routing services are provided to businesses in LAN and WAN environments or over the Internet.



Routing is used for multiprotocol LAN-to-LAN, LAN-to-WAN, VPN, and network address translation (NAT) routing services.



By using RRAS, VPN connections can be deployed to provide end users with remote access to your organization's network.



A site-to-site VPN connection between two servers at different locations can also be created.

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review 1.

Complete NetFund_SA_2.2

2.

Exchange papers and check the answers as the teacher reviews them

LEESSSSOO L N N2 . 31 _. A1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand Media Types Part 1

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn information about: • Network media types • Cable types and their characteristics • Fiber optics • Susceptibility to external interference • Susceptibility to electricity

• Susceptibility to interception

LESSON

1.1

98-366 Networking Fundamentals

Activating prior knowledge 1.

Compare these 2 images of cables.

2.

Discuss the implications of each in your small group.

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set Network Media types 

Media is the actual physical environment through which data travels as it moves from one component to another and connects network devices.



Two categories of Media are cable network and wireless network.



To determine what transmission media is right for particular networking environment you need to consider: o

Required throughput

o

Cabling distance

o

Noise resistance

o

Security

o

Flexibility

o

Plans for growth

LESSON

1.1

98-366 Networking Fundamentals

Common Network Cable Media 

Twisted-pair cable (shielded, unshielded, stranded copper, solid core copper)



Coaxial cable and RFI



Fiber-optic cable



Wireless

LESSON

1.1

98-366 Networking Fundamentals

Twisted pair cables 

Available unshielded (UTP) or shielded (STP)



STP is used in noisy environments where the shield is around each of the wire pairs, plus an overall shield protects against excessive electromagnetic interference.



A variation of STP, known as ScTP for "screened twisted pair" or FTP for "foil twisted pair," uses only the overall shield and provides more protection than UTP, but not as much as STP.



Both UTP and STP come in Stranded and Solid wire. o

The stranded copper wire is very flexible.

o

Solid wire cable has less attenuation and can span longer distances.

LESSON

1.1

98-366 Networking Fundamentals

LESSON

1.1

98-366 Networking Fundamentals

Coaxial cables 

Were the first cables used in Ethernet networks.



Consists of an insulator that separates the braided inner conductor and the outer conductor, which is a woven copper braid



Commonly used for cable TV connections and10 Base5 and 10 Base2 Ethernet networks.



Coaxial Thinnet supports a maximum segment length of 185 meters, is less costly and easier to install



Coaxial Thicknet can send signals up to 500 meters, is costlier and demands more efforts in installation



The transmission speed these cables provide is between 2.5 Mbps and 10 Mbps.



Coaxial cables are more resistant to EMI than the UTP cable, because of greater insulation to external interference.

LESSON

1.1

98-366 Networking Fundamentals

Fiber Optics 

Cables are made up of glass or other light transmitting material.



Transmit data in the form of light



A reflective coating that allows light beams to travel without outer interference covers the glass cable.



The advantages: o

Faster

o

Very long distances without the risk of outer interference



At one end of the fiber optics system is a transmitter that accepts coded electronic pulse data coming from copper wire.



The information is processed and translated into equivalently coded light pulses.



A light-emitting diode (LED) or an injection-laser diode (ILD) can be used for generating the light pulses.

LESSON

1.1

98-366 Networking Fundamentals 

Fiber optic cable construction has these elements: core, cladding, coating, strengthening fibers, and a cable jacket.



The center is glass fiber, the second ring is a fiber coating, and third ring is a thermoplastic over coating or buffer, the fourth ring is an Aramid strength member and the last ring has a PVC jacket or a fluoride copolymer jacket.

LESSON

1.1

98-366 Networking Fundamentals 



Single mode fiber (SMF) optic cable and multi-mode fiber (MMF): o

SMF supports high-speed LAN covering long distances and WAN spread over different buildings or cities.

o

Used in 10GBase-LR Ethernet specification, which runs at the speed of 10 Gbps and allows only one mode of light to transmit.

The multi-mode fiber (MMF) optic cable : o

Used for high-speed networks spread over short distances

o

Used for 10GBase-SR Ethernet standard that supports the transmission speed of 10 Gbps, it allows the light signals to travel in more than one path

o

Less costly than the SMF cable

LESSON

1.1

98-366 Networking Fundamentals

Wireless communication 

The transfer of information over a distance without the use of physical media



The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometers for radio communications)



Wireless communication is considered to be a branch of telecommunications

LESSON

1.1

98-366 Networking Fundamentals

External Interference 

Interference in telecommunication and electronics refers to anything that alters, modifies, or disrupts a message as it travels along a channel between a source and a receiver.



External susceptibility comes from machinery and power cables.



Tightly strapped cabling often causes interference from motors and solenoids jumping over to the signal cabling and disturbing sensors. o



Jumping occurs when the high current can cause the rapid release of large volumes of hydrogen, which can be ignited by a nearby spark.

See examples of external interference from equipment and cables at www.qedata.se/e_emi_bakgrund.htm.

LESSON

1.1

98-366 Networking Fundamentals

Electromagnetic interference (EMI) 

Undesirable electromagnetic emission or any electrical or electronic disturbance.



EMI can be man-made or natural and interrupts, obstructs, or otherwise degrades or limits the effective performance of electronics and electrical equipment.



The source may be any object, artificial or natural, that carries rapidly changing electrical currents, such as an electrical circuit, the Sun or the Northern Lights.

LESSON

1.1

98-366 Networking Fundamentals 

Twisted pair’s susceptibility to electromagnetic interference greatly depends on the pair twisting schemes staying intact during the installation.



As a result, twisted pair cables usually have stringent requirements for maximum pulling tension as well as minimum bend radius.



The fragility of twisted pair cables makes installation practices an important part of ensuring the cable’s performance.

LESSON

1.1

98-366 Networking Fundamentals

Interception 

Data communication equipment emits modulated signals that carry information that an eavesdropper or hacker can intercept. o



It is completely undetectable, requires little apparatus, and can be done at a considerable distance.

Like fiber optics but without the fiber, LED indicators act as little freespace optical data transmitters.

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review •

Create a list of the networks in your home, school, or place of work.



Speculate about the types of interference susceptibility that each might be vulnerable to.



Compare your ideas with your partner.

LE ESSSSOO N N2 . 31_. B1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand Network Media Types Part 2

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn information about: 

Cabling



Category 5e cable



Coaxial cable



RJ-45



Thicknet cable



Thinnet coaxial cable



Twisted pair shielded cable



Unshielded cable

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set 1.

Recall what you learned about cables yesterday.

2.

On paper list everything you remember about twisted pair cables.

3.

Share your answers in a group and present to the class if time allows.

LESSON

1.1

98-366 Networking Fundamentals

Preparing for a Class Activity 

Students will make a cable at the end of this review using a category 5 cable and RJ-45 terminators.



Keep notes on the demonstration and presentation for your cable making.

LESSON

1.1

98-366 Networking Fundamentals

Unshielded twisted pair cable (UTP) 

8 individual copper wires covered by an insulating material



Used for many different networks.



The copper wire is color-coded plastic insulation and they are twisted in pairs. It is all covered with an outer jacket.

LESSON

1.1

98-366 Networking Fundamentals 

UTP is the most common form of twisted pair wiring.



It is less expensive and easier to work with than STP.



It is used in Ethernet 10Base-T and 100Base-T networks, as well as in home and office telephone wiring.



Two insulated copper wires are twisted around each other to decrease crosstalk or electromagnetic induction between pairs of wires.



Every signal on a twisted pair involves both the wires.



Twisted pair is installed in two or more pairs, all within a single cable, to offer multiple connections to computers.



UTP cable is typically installed using a registered jack 45 (RJ-45) connector.



The RJ-45 is an eight-wire connector used commonly to connect computers onto a local area network (LAN), especially Ethernets.

LESSON

1.1

98-366 Networking Fundamentals

Types of UTP Cabling 

Category 1—Used for telephone communications



Category 2—Data speed at 4 Mbps per second



Category 3—Speeds of 10 Mbps, used for 10BASE-T



Category 4—For Token Ring – transmit data at 16 Mbps



Category 5—Can transmit data at speeds up to 100 Mbps



Category 5e —Used in networks running at speeds up to 1000 Mbps (1 gigabit per second [Gbps])



Category 6—Consists of four pairs of 24 American wire gauge (AWG) copper wires and fastest standard for UTP

LESSON

1.1

98-366 Networking Fundamentals

Shielded twisted-pair (STP) 

Used in Ethernet networking and has shielding, cancellation, and wire twisting with each pair of wires wrapped in a metallic foil



The four pairs of wires are wrapped in an overall metallic braid or foil, generally 150-ohm cable.

LESSON

1.1

98-366 Networking Fundamentals 

Because of its cost and difficulty with termination, STP is rarely used in Ethernet networks.



STP is primarily used in Europe.



Because most buildings are already wired with UTP, many transmission standards are adapted to use it, to avoid costly rewiring with an alternative cable type.



UTP and STP are not used together.

LESSON

1.1

98-366 Networking Fundamentals

Coaxial cable • Made of a hollow outer cylindrical conductor surrounding a single inner wire made of two conducting elements • One element in the center of the cable is a copper conductor. • A layer of flexible insulation surrounds the copper conductor. • Over the insulation is a metallic foil or woven copper braid acting as both the second wire in the circuit and a shield for the inner conductor . • This second layer/shield helps reduce the amount of outside interference.

LESSON

1.1

98-366 Networking Fundamentals 

Coaxial cable can be cheaper for a physical bus topology because less cable will be needed.



It is more costly than UTP on a per-unit length and is relatively inexpensive.



Coaxial cable is less expensive than fiber optic cable.



Can be used over longer distances than twisted-pair cable



Ethernet can run approximately 100 meters using twisted-pair cabling. Using coaxial cable increases this distance to 500 meters.



Can be run with fewer boosts from repeaters for longer distances between network nodes than either STP or UTP cable

LESSON

1.1

98-366 Networking Fundamentals

Wireless communication Uses radio frequencies (RF) or infrared (IR) waves to transmit data between devices on a LAN Wireless signals are electromagnetic waves that can travel through the vacuum of outer space and through a medium such as air. A key module is the wireless hub for distributing signals through the wireless LAN. A computer can have a wireless adapter card (wireless NIC) installed to receive the signals from the access point.

LESSON

1.1

98-366 Networking Fundamentals

Applications of wireless data communication 

Accessing the Internet using a cellular phone



Establishing Internet connection over satellite



Beaming data between two handheld computing devices



Wireless keyboard and mouse for the PC



Wireless LAN (WLAN) use radio waves (902 MHz)



Microwaves (2.4 GHz)



IR waves (820 nanometers [nm]) for communication

LESSON

1.1

98-366 Networking Fundamentals

Wireless Distribution

LESSON

1.1

98-366 Networking Fundamentals

LESSON

1.1

98-366 Networking Fundamentals

Demonstration and Class Activity Preparation 

Unshielded twisted pair cable (UTP) cable has eight individual copper wires covered by an insulating material; used for many different networks.



The copper wire is color-coded plastic insulation and the wires are twisted in pairs. It is all covered with an outer jacket.

LESSON

1.1

98-366 Networking Fundamentals



Color coding of wiring pairs

LESSON

1.1

98-366 Networking Fundamentals

Network Cabling Standards 

The Electronic Industries Alliance (EIA) developed standards in 1991 for the cabling used in telecommunications applications.



In 1995 it was updated by the EIA and later replaced with the current TIA/EIA 568-B standard.

LESSON

1.1

98-366 Networking Fundamentals

T568A and T568B 

Based on TIA/EIA-568-B.1-2001, the wiring schemes define the pin out, or order of connections, for wires in eight-pin modular connector plugs and jacks.

LESSON

1.1

98-366 Networking Fundamentals 

The wiring assignments in the RJ-45 plug are important. A colored wire must be placed in a specific pin location in the plug in order for the cable to meet the standard.



It is these wiring assignments that differ between the T568A and T568B standard.



The only difference between T568A and T568B is that pairs 2 and 3 (orange and green) are swapped.



Both configurations wire the pins "straight through," i.e., pins 1 through 8 on one end are connected to pins 1 through 8 on the other end.



The same sets of pins are paired in both configurations: pins 1 and 2 form a pair, as do 3 and 6, 4 and 5, and 7 and 8.

LESSON

1.1

98-366 Networking Fundamentals

Cable Termination 

Cables that are terminated with differing standards on each end will not function normally.



Standard RJ-45 pinouts describe the arrangement of the individual wires required when connecting connectors to a cable.



RJ-45 is the standard connector for 10Base-T/100Base-TX Ethernet, ISDN, T1, and modern digital telephone systems.

LESSON

1.1

98-366 Networking Fundamentals

Demonstration Steps 1.

The pins on the RJ-45 plug are numbered 1 to 8.

2.

Hold a CAT 5 patch cable in your hand, as if inserting into a jack, with the contacts facing in the up position; pin 1 will be on the far left.

3.

Pin 8 will be the pin on the far right. We follow this orientation when we define the wiring assignments in the RJ-45 plug.

4.

CAT 5 Cable has four twisted pairs within the sheath. Each pair has a specific color code, and is placed into deliberate pin location within the RJ-45 plug.

5.

In constructing the cable, use identical pin assignments on each end as the 568-B standard is used in the United States.

LESSON

1.1

98-366 Networking Fundamentals

Deciding to use T568 A or T568 B 1.

If the installation is residential, choose T568A unless other conditions apply.

2.

If there is preexisting voice/data wiring (remodel, moves, adds, changes), duplicate this wiring scheme on any new connection.

3.

If project specifications are available, use the specified wiring configuration.

4.

If components used within the project are internally wired either T568A or T568B, duplicate this wiring scheme.

Circulate and carefully inspect the finished demonstration cable.

LESSON

1.1

98-366 Networking Fundamentals

Student Activity 2.3_B 1.

Group in pairs so each person can attach an RJ-45 end to the category 5e cable.

2.

View the YouTube video on making a patch cord with RJ-45 terminators and a category 5e cable wire. http://www.youtube.com/watch?v=482VtesZwZ8

3.

Complete Student Activity 2.3_B with a partner to construct a cable using the materials provided.

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review 1.

Test the cable.

2.

Analyze and correct any problems.

3.

Detail the testing and correcting process in a written report.

4.

Submit to your instructor.

LE ESSSSOO N N3 . 11_. A1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand the OSI Model Part 1

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about: •

Internetwork



IETF



ISO/OSI



ITU-T



Protocols

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set 1.

Problem: Personal computer use and the Internet have grown very quickly. Corporations and educational users are developing large networks and individuals access the Internet in huge numbers. There is no pattern or organization, and networks have developed without planning.

2.

Assignment: Think about how you might resolve the complicated issues that have arisen. List some of your ideas for unclogging and making the Internet smoother for corporations, educational institutions, and individuals.

LESSON

1.1

98-366 Networking Fundamentals

Internetwork •

A collection of individual networks, connected by intermediate networking devices, that functions as a single large network



Formed from different kinds of network technologies that can be interconnected by routers and other networking devices



Offers a solution to three key problems:



o

Isolated LANs

o

Duplication of resources

o

A lack of network management

Many issues including configuration, security, redundancy, reliability, centralization, and performance, must be adequately dealt with for the internetwork to function smoothly.

LESSON

1.1

98-366 Networking Fundamentals

ISO (International Organization for Standardization) •

The world's largest developer and publisher of International Standards. ISO is now considered the primary architectural model for intercomputer communications.

OSI (Open System Interconnection model) •

Defines a networking framework for implementing protocols in seven layers

ITU-T (International Telecommunications Union-Telecommunication) •

The standardization division of the ITU that develops communications recommendations for all analog and digital communications

IETF (Internet Engineering Task Force) •

Charged with studying technical problems facing the Internet and proposing solutions to the Internet Architecture Board ; the standards agency for TCP/IP

LESSON

1.1

98-366 Networking Fundamentals

Open System Interconnection (OSI) Reference Model •



How information from a software application in one computer moves through a network medium to a software application in another computer. In the International Organization for Standardization Open Systems Interconnection (ISO/OSI) model for network communications, WNet functions operate across the presentation and session layers.

LESSON

1.1

98-366 Networking Fundamentals

The data enter as they transmit, going down the seven layers, and exit as they are received at the right, going up the layers.

Image courtesy of The Abdus Salam International Centre for Theoretical Physics.

LESSON

1.1

98-366 Networking Fundamentals

Characteristics of the OSI Layers •

Each of the seven layers of the OSI reference model can be divided into two categories: upper layers and lower layers.



Application issues implemented only in software is part of the upper layer of the OSI model. It is the highest layer and closest to the end user.



Software applications that contain a communications component are used both by the users and the application layer process.

LESSON

1.1

98-366 Networking Fundamentals

Protocols •

A set of rules that direct the way computers exchange information



Communication protocols enable communication and execute the functions of one or more of the OSI layers. o

At the physical and data link layers of the OSI model LAN protocols define communication over the various LAN media.

o

At the lowest three layers of the OSI model WAN protocols define communication over the various wide-area media.

o

Routing protocols control the exchange of information between routers so that the routers can select the proper path for traffic.

o

Network protocols apply to various upper-layer protocols.

LESSON

1.1

98-366 Networking Fundamentals

OSI Model and Communication Between Systems •

The OSI layers are where information being transferred from a software application in one computer system to a software application in another must pass.



The application layer then passes the information to the presentation layer (Layer 6), which sends the data to the session layer (Layer 5), and so on down to the physical layer (Layer 1).



At the physical layer, the data are placed on the physical network medium and are relayed across the medium to System 2.



The physical layer of System 2 removes the data from the physical medium, and then passes the information up to the data link layer (Layer 2), which passes it to the network layer (Layer 3), and so on, until it reaches the application layer (Layer 7) of System 2.



Lastly, the application layer of System 2 passes the data to the recipient application to complete the communication process.

LESSON

1.1

98-366 Networking Fundamentals

Interaction Between OSI Model Layers •



A specified layer in the OSI model generally communicates with three other OSI layers: o

the layer directly above it

o

the layer directly below it

o

its peer layer in other networked computer systems

The data link layer in System 1, communicates with the network layer of System 1, the physical layer of System 1, and the data link layer in System 2.

LESSON

1.1

98-366 Networking Fundamentals

OSI Layer Services •

One OSI layer communicates with another layer to make use of the services provided by the second layer.



The services provided by adjacent layers help a given OSI layer communicate with its peer layer in other computer systems.



Three basic elements are involved in layer services: 1.

2.

3.

The service user—Layer that requests services from the next OSI layer The service provider —Layer that provides services to service users

The service access point (SAP) —Intangible place at which one OSI layer can request the services of another layer.

LESSON

1.1

98-366 Networking Fundamentals

Encapsulation •

The OSI Model Layers and Information Exchange is done by the use of communication control to communicate with the peer layers in other computer systems and consists of specific requests and instructions that are exchanged between peer OSI layers.



The data portion of an information unit at a stated OSI layer can contain headers that have been passed down from upper layers.



The data that has been passed down from upper layers are appended to trailers.



The data portion of an information unit at a given OSI layer can contain headers, trailers, and data from all the higher layers. This is known as encapsulation.

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review Student ActivityNetFund_SA_3.1_A Understanding Protocols and Services

LESSON

1.1

98-366 Networking Fundamentals

Class Activity: How well do you really know the OSI networking model? 1.

Test yourself with our OSI Model game. http://www.gocertify.com/games/osi-game.shtml

2.

Complete the review at the end of each game and record any missed questions with the correct answer to either turn in or discuss with the whole class.

LE ESSSSOO N N3 . 11_. B1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand the OSI Model Part 2

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn information about: •

Frames



Packets



Segments



TCP



TCP/IP Model



Well-known ports for most-used purposes

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set Review and discuss the role of the following items in OSI: application

presentation

session

transport

network

data link

physical If you complete the work, you may review the OSI Networking Game http://www.gocertify.com/games/osi-game.shtml

LESSON

1.1

98-366 Networking Fundamentals

The Internet Protocol Suite •

Includes Transmission Control Protocol (TCP) and Internet Protocol (IP) and is referred to as TCP/IP model.



Defines general guidelines and implementations of specific networking protocols to enable computers to communicate over a network for common applications (electronic mail, terminal emulation, and file transfer)



Each layer of the TCP/IP model corresponds to layers of the seven-layer OSI reference model proposed by the ISO.



Ipsec (Internet Protocol Security) is a dual mode, end-to-end, security scheme operating at the Internet Layer of the Internet Protocol Suite or OSI model Layer 3.

LESSON

1.1

98-366 Networking Fundamentals

The TCP/IP is shown in relation to the OSI seven layers. TCP delivers an unstructured stream of bytes identified by sequence numbers with stream data transfer.

LESSON

1.1

98-366 Networking Fundamentals

TCP/IP •

Provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed, and received



Protocols exist for a variety of communication services between computers.



The layers near the top are closer to user application, the layers near the bottom are closer to the physical transmission of the data.



Viewing layers as providing or consuming a service is a method of abstraction to isolate upper layer protocols.



The lower layers avoid having to know the details of each and every application and its protocol.

LESSON

1.1

98-366 Networking Fundamentals

Transmission Control Protocol (TCP) •

Assembles bytes into segments and passes to IP for delivery



Provides end-to-end reliable packet delivery through an internetwork



Mechanisms deal with lost, delayed, duplicate, or misread packets.



Time-out mechanisms detect lost packets and request retransmission.



Provides proficient flow control. o



When sending responses back to the source, the receiving TCP process indicates the highest sequence number it can receive without overflowing its internal buffers.

Full-duplex operation processes can both send and receive at the same time. o

Multiplexing means that numerous concurrent upper-layer conversations can be occurring over a single connection.

LESSON

1.1

98-366 Networking Fundamentals •

Each host on a TCP/IP network is assigned a unique 32-bit logical address that is divided into two main parts: 1.

2.

Network number – identifies a network and must be assigned by the Internet Network Information Center (InterNIC) if the network is to be part of the Internet Host number – identifies a host on a network and is assigned by the local network administrator

LESSON

1.1

98-366 Networking Fundamentals

Internet Protocol (IP) •

A network layer (Layer 3) protocol that contains addressing information and some control information that enables packets to be routed



IP is documented in RFC 791 – Request For Comments for Internet Protocol, the specification for how traffic travels over the internet and is the primary network layer protocol in the Internet protocol suite



Allows large data transfer so file applications do not have to cut data into blocks

LESSON

1.1

98-366 Networking Fundamentals

Well-Known Ports •

Most services work with TCP/IP by configuring the server to use a well-known port number.



The client connects from a random high port.



Most of these well-known ports are port numbers below 1,024.



TCP/IP port assignments on Windows are stored in the \%systemroot%\System32\drivers\etc\services file.

LESSON

1.1

98-366 Networking Fundamentals

Examples of known services and ports FTP 20,21 SSH 22 telnet 23 DNS 53 SMTP 25 DHCP 67,68 TFTP 69 HTTP 80 POP2/3 109, 110 NNTP 119 IMAP4 143 HTTPS 443

data transfer secure shell telnet protocol domain name service simple mail transfer protocol dynamic host configuration protocol trivial file transfer protocol hypertext transfer protocol post office protocol 2, 3 network news transfer protocol internet message access protocol hypertext transfer protocol over SSL/TLS

LESSON

1.1

98-366 Networking Fundamentals

User Datagram Protocol (UDP) •

Part of the Internet Protocol suite



Programs running on different computers on a network can send short messages known as datagrams to one another.



A datagram is a self-sufficient and self-contained message sent through the network whose arrival, arrival time, and content are not guaranteed.



UDP can be used in networks where TCP is traditionally implemented but is not reliable.



Datagrams may go missing without notice, or arrive in a different order from the one in which they were sent.

LESSON

1.1

98-366 Networking Fundamentals

IP responsibilities in UDP 1.

Provide connectionless delivery of datagrams

2.

Provide fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes o

The maximum transmission unit (MTU) of a communications protocol of a layer is the size in bytes of the largest protocol data unit that the layer can pass onward; a packet is encapsulated into one or more frames, depending upon the MTU size.

LESSON

1.1

98-366 Networking Fundamentals

IP Packets •All IP packets are structured the same way – an IP header followed by a variable-length data field. •There are 14 fields in an IP packet header.

LESSON

1.1

98-366 Networking Fundamentals •

A packet and a frame are both packages of data moving through a network.



A packet exists at Layer 3 of the OSI Model, a frame exists at Layer 2 of the OSI Model.



Layer 2 is the Data Link Layer – the best-known protocol in this layer is Ethernet.



Layer 3 is the Network Layer – the best-known protocol in this layer is IP (Internet Protocol).



The TCP segment, encapsulates all higher level protocols above it, a segment at the transport layer and the TCP counterparts for these three items.

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review Complete Student Activity NetFund_SA_3.1_B.

LESSON

31 . 2 1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand IPv4

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about:  APIPA  addressing  classful IP addressing and classless IP addressing  gateway  IPv4

 local loopback IP  NAT  network classes  reserved address ranges for local use

 subnetting  static IP

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set 1.

Write the address range and broadcast address for the following subnet: Subnet: 192.168.1.128 / 255.255.255.224 Address Range? Subnet Broadcast Address?

2.

Check your answer with those provided by the instructor. If it is different, review the method of how you derived the answer with your group and correct your understanding.

LESSON

1.1

98-366 Networking Fundamentals

IPv4 

A connectionless protocol for use on packet-switched Link Layer networks like the Ethernet



At the core of standards-based internetworking methods of the Internet



Network addressing architecture redesign is underway via classful network design, Classless Inter-Domain Routing, and network address translation (NAT) .



Microsoft Windows uses TCP/IP for IP version 4 (a networking protocol suite) to communicate over the Internet with other computers.



It interacts with Windows naming services like WINS and security technologies.



IPsec helps facilitate the successful and secure transfer of IP packets between computers.



An IPv4 address shortage has been developing.

LESSON

1.1

98-366 Networking Fundamentals

Network Classes Provide a method for interacting with the network All networks have different sizes so IP address space is divided in different classes to meet different requirements. Each class fixes a boundary between the network prefix and the host within the 32-bit address.

LESSON

1.1

98-366 Networking Fundamentals

Classful Network 

Divides the address space for Internet Protocol Version 4 (IPv4) into five address classes



Each class, coded in the first four bits of the address, defines a different network size or a different network type.



Design for IPv4 – sized the network address as one or more 8-bit groups, resulting in the blocks of Class A, B, or C addresses.

LESSON

1.1

98-366 Networking Fundamentals

Classless Interdomain Routing (CIDR) 

A tactic of assigning IP addresses and routing Internet Protocol packets



Allocates address space to Internet service providers and end users on any address bit boundary, instead of on 8-bit segments



IP addresses consist of two groups of bits in the address: 1.

Most significant part is the network address, which identifies a whole network or subnet

2.

Least significant part is the host identifier, which specifies a particular host interface on that network

LESSON

1.1

98-366 Networking Fundamentals 

Under supernetting, the classful subnet masks are extended so that a network address and subnet mask could specify multiple Class C subnets with one address.



For example, if 1,000 addresses were needed, 4 Class C networks could be supernetted together:



The subnet 192.60.128.0 includes all the addresses from 192.60.128.0 to 192.60.131.255.

LESSON

1.1

98-366 Networking Fundamentals

IPv4 Addresses 

Usually written in dot-decimal notation of four octets of the address expressed in decimals and separated by periods



Base format used in the conversion table. Each octet can be of any of the different bases

LESSON

1.1

98-366 Networking Fundamentals

Reserved IP Addresses •Three ranges of address are reserved for private networks.

•Ranges are not routable outside of private networks. •Private machines cannot directly communicate with public networks.

•Internet Assigned Numbers Authority (IANA) reserved three blocks of IP address space for private internets. •Confusion results because different authorities name different IP numbers for different addresses.

LESSON

1.1

98-366 Networking Fundamentals

IANA Reserved Blocks

LESSON

1.1

98-366 Networking Fundamentals

Automatic Private IP Addressing (APIPA) 

When the address block was reserved, no standards existed for mechanisms of address auto-configuration.



Filling the void, Microsoft created APIPA implementation.



APIPA will automatically assign an Internet Protocol address to a computer on which it is installed.



APIPA has been deployed on millions of machines and has become a de facto standard in the industry.



IETF defined a formal standard for this functionality, RFC 3927, entitled Dynamic Configuration of IPv4 Link-Local Addresses.

LESSON

1.1

98-366 Networking Fundamentals

Localhost 

The address range 127.0.0.0–127.255.255.255 is reserved for localhost communication (127.0.0.0/8 in CIDR notation).



Addresses within this range should never appear outside a host computer and packets sent to this address.



Addresses are returned as incoming packets on the same virtual network device (known as loopback).



Loopback or Localhost 127.0.0.0 (or 127/8) should not be used as an address for any station; it is used to ping yourself.

LESSON

1.1

98-366 Networking Fundamentals

Broadcast Address 

An address that allows information to be sent to all machines on a given subnet



Found by obtaining the bit complement of the subnet mask and performing a bitwise OR operation with the network identifier



Example: To broadcast a packet to an entire IPv4 subnet using the private IP address space 172.16.0.0/12 (subnet mask 255.240.0.0), the broadcast address is 172.31.255.255.

LESSON

1.1

98-366 Networking Fundamentals 

On a Class A, B, or C subnet, the broadcast address always ends in 255.



Today, there are several driving forces for the acceleration of IPv4 address exhaustion: o

Mobile devices

o

Always-on devices

o

Rapidly growing number of Internet users

LESSON

1.1

98-366 Networking Fundamentals

A Gateway Computer Program 

A link between two computer programs allowing them to share information and bypass certain protocols on a host computer



A telecommunications gateway is a computer or a network that allows or controls access to another computer or network.



A default gateway is a way out of the subnet and it is also known as a router.



All traffic that needs to be routed out of the subnet is done through the hosts’ routing tables.

LESSON

1.1

98-366 Networking Fundamentals

Static vs. Dynamic IP Addresses 



Static IP address o

When a computer is configured to use the same IP address every time it powers up

o

Manually assigned to a computer by an administrator

Dynamic IP address o

When the computer's IP address is set automatically

o

Assigned either by the computer interface or host software itself, as in Zeroconf, or assigned by a server using Dynamic Host Configuration Protocol (DHCP)

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review Complete Student Activity NetFund_SA_3.2

LEESSSSOO L N N3 . 31 _. A1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand IPv6 Part 1

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about: Addressing Dual

IP stack

Gateway IPv6 ipv4toipv6

tunneling protocols to ensure backwards compatibility

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set Explain why IPv4 is typically insufficient and why IPv6 is more useful. Form groups of three to discuss your answers.

LESSON

1.1

98-366 Networking Fundamentals

Tunneling Protocol Used by computer networks when the delivery network protocol encapsulates a different payload protocol

Teredo o

A tunneling protocol intended to grant IPv6 connectivity to nodes that are located behind IPv6-unaware NAT devices.

o

Identifies a way of encapsulating IPv6 packets within IPv4 UDP datagrams that can be routed through NAT devices and on the IPv4 internet.

o

6to4 is an Internet conversion mechanism for migrating from IPv4 to IPv6, a system that allows IPv6 packets to be transmitted over an IPv4 network with no need to configure explicit tunnels. Special relay servers are also in place that permit 6to4 networks to communicate with native IPv6 networks.

LESSON

1.1

98-366 Networking Fundamentals

IPv6 has all zeroes for the middle 16 bits; thus, they start off with a string of 96 zeroes, followed by the IPv4 address.

LESSON

1.1

98-366 Networking Fundamentals

ISATAP 

Intra-Site Automatic Tunnel Addressing Protocol



An IPv6 transition mechanism meant to transmit IPv6 packets between dual-stack nodes on top of an IPv4 network o

Uses IPv4 as a virtual nonbroadcast multiple-access network (NBMA) data link layer, so that it does not require the underlying IPv4 network infrastructure to support multicast.

o

The IP6_ADDRESS structure stores an IPv6 address and the IPv6 subnet size has been standardized by fixing the size of the host identifier portion of an address to 64 bits to assist an automatic mechanism for forming the host identifier from Link Layer media addressing information (MAC address).

LESSON

1.1

98-366 Networking Fundamentals

Dual IP Stack 

Special addresses assigned to IPv6-capable devices speak both IPv4 and IPv6.



Dual Stack Architecture involves running IPv4 and IPv6 at the same time where end nodes and routers/switches run both protocols.



If IPv6 communication is possible that is the preferred protocol.



Windows uses a dual-stack architecture as shown here.

LESSON

1.1

98-366 Networking Fundamentals

Dual IP Stack (continued) A common dual-stack migration strategy used to create the transition from the core to the edge 

Enables two TCP/IP protocol stacks on the WAN core routers, secondly perimeter routers and firewalls, next the server-farm routers, and finally the desktop access routers.



Allows dual protocol stacks on the servers and then the edge computer systems.



Socket can accept connections from both IPv6 and IPv4 TCP clients connecting to port 5001.



This can be seen with IPconfig on an Windows XP or later OS.

LESSON

1.1

98-366 Networking Fundamentals

Gateway 

A computer program link between two computer programs so they can share information and bypass certain protocols on a host computer and/or a network that allows or controls access to another computer or network o

Default Gateway—A way out of the subnet; also known as a router

o

Network gateway—An internetworking system that can join two networks that use different base protocols and can be implemented completely in software, completely in hardware, or as a combination

LESSON

1.1

98-366 Networking Fundamentals

GLBP (Gateway Load Balancing Protocol) 

Provides automatic router backup for IPv6 hosts configured with a single default gateway on an IEEE 802.3 LAN



Benefits include load sharing, multiple virtual routers, preemption, and authentication.



Can operate at any level of the OSI model depending on the types of protocols they support.



Appears at the edge of a network, capabilities like firewalls tend to be integrated with it.



A broadband router often serves as the network gateway although ordinary computers can also be configured to perform equivalent functions on home networks.

LESSON

1.1

98-366 Networking Fundamentals

Internet Protocol version 6 (IPv6) 

An Internet Protocol version designed to succeed IPv4 with an Internet Layer protocol for packet-switched internetworks



The main driving force for the redesign of Internet protocol is the foreseeable IPv4 address exhaustion



IPv6 has a large address space and supports 2128 (about 3.4×1038) addresses



Provides flexibility in allocating addresses and routing traffic, adding a column.



Implements new features that simplify aspects of address assignment and network renumbering.



Subnet size has been standardized as 64 bits, expanded addressing moves us from 32-bit address to a 128-bit addressing method.

LESSON

1.1

98-366 Networking Fundamentals

Convert from Hexadecimal to Binary 

Translate each hexadecimal digit into its 4-bit binary equivalent.



Hexadecimal numbers have either and 0x prefix or an h suffix.

For example, the hexadecimal number: 0x3F7A translates to 0011 1111 0111 1010

LESSON

1.1

98-366 Networking Fundamentals

The IPv6 packet header is 40 bits long and consists of Version, Class, Flow Label, Payload Length, Next Header, Hop Limit, Source Address, Destination Address, Data, and Payload fields.

LESSON

1.1

98-366 Networking Fundamentals

IPv6 Broadcasting Methods Unicast Broadcast 

A communication between a single host and a single receiver



Packets sent to a unicast address are delivered to the interface identified by that address.



There is a one-to-one association between network address and network endpoint: each destination address uniquely identifies a single receiver endpoint.

LESSON

1.1

98-366 Networking Fundamentals

Multicast Broadcast 

A communication between a single host and multiple receivers



Packets are sent to all interfaces--to every device on a network.



It is a one-to-many association between network addresses and network endpoints: each destination address identifies a set of receiver endpoints, to which all information is replicated.

LESSON

1.1

98-366 Networking Fundamentals

Anycast Broadcast 

A communication between a single sender and a list of addresses



It can contain End Nodes and Routers, and packets are sent to an anycast address.



There is a one-to-"one-of-many" association between network addresses and network endpoints: each destination address identifies a set of receiver endpoints, but only one of them is chosen at any given time to receive information from any given sender.

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review Complete Student Activity 3.3_A

LEESSSSOO L N N3 . 31 _. B1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand IPv6 Part 2

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about: Ipconfig Local

loopback IP

Ports Packets Subnetting Subnetmask Reserved

address ranges

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set 1.

Compare the IPv4 with the IPv6 sections of Ipconfig on this Windows 7 screen.

2.

Identify aspects you do not understand.

LESSON

1.1

98-366 Networking Fundamentals

Ipconfig 

An Internet protocol configuration in Microsoft Windows that is a console application 1.

Displays all current TCP/IP network configuration values

2.

Refreshes Dynamic Host Configuration Protocol (DHCP)

3.

Refreshes domain name system (DNS) settings



Can be utilized to verify a network connection as well as to verify your network settings



The default displays only the IP address, subnet mask, and default gateway for each adapter bound to TCP/IP.



There are differences with each version of windows.

LESSON

1.1

98-366 Networking Fundamentals

Ipconfig in Windows 7 OS

LESSON

1.1

98-366 Networking Fundamentals

Ipconfig in Vista OS

LESSON

1.1

98-366 Networking Fundamentals

Ipconfig in Windows XP OS IPversion4

LESSON

1.1

98-366 Networking Fundamentals

Loopback Device in TCP/IP 

A virtual network interface executed in software only, not connected to any hardware



Any traffic that a computer program sends to the loopback interface is immediately received on the same interface.



IPv6 assigns only a single address for this function, 0:0:0:0:0:0:0:1 (also written as ::1), having the ::1/128 prefix.



The loopback device is 127.0.0.1 for IPv4.



The standard reserved domain name for these addresses is localhost.



Pinging the special address loopback interface is a standard test of the functionality of the IP stack in the operating system.

LESSON

1.1

98-366 Networking Fundamentals

Port 

A process-specific software build serving as a communications endpoint and used for multitasking



Used by transport layer protocols such as transmission control protocol (TCP) and user datagram protocol (UDP)



Identified by its port number, the IP address associated with, and the protocol used for communication



Port numbers are divided into three ranges: o

Well-known ports are from 0 through 1023

o

Registered ports are from 1024 through 49151

o

Dynamic and private ports are from 49152 through 65535

LESSON

1.1

98-366 Networking Fundamentals

Sample Ports and Allocations

LESSON

1.1

98-366 Networking Fundamentals

Packets 

A packet mode is a digital networking communications method grouping all transmitted data into blocks.



Communications links that do not support packets transmit data as a series of bytes, characters, or bits alone.



When data is formatted into packets, the communication medium bitrate can be better shared among users.



All data exchanged using IPv6 is contained in packets.

LESSON

1.1

98-366 Networking Fundamentals

Packets (cont.) 

The IPv6 packet is composed of : o

the fixed header

o

optional extension headers

o

the payload—the transport layer data carried by the packet



The control information provides data the network needs to deliver to the user data such as source and destination addresses.



The user data would be the information being sent.



An illustration of this concept is sending a letter in an envelope: o

The envelop has the address.

o

The user data is in the envelope.

LESSON

1.1

98-366 Networking Fundamentals

Unique Local Addresses (ULA) 

Included in Internet protocol IPv6.



The address block fc00::/7 has been reserved by IANA as described in RFC 4193.



Defined as unicast in character and contain a 40-bit random number in the routing prefix to prevent collisions when two private networks are interconnected.



Despite being inherently local in usage, the IPv6 address scope of unique local addresses is global.

LESSON

1.1

98-366 Networking Fundamentals

Private Network 

Private network is one scenario that uses a set of standards for private IP address space. o

Reserved address ranges are for local use.

o

Used for homes and small businesses

o

Also used in corporate networks not connected directly to the Internet for security



A NAT gateway is usually used to enable Internet connectivity to multiple hosts such as a second computer or a video game with IPv4.



IPv6 is designed so that network address translator (NAT) goes away.

LESSON

1.1

98-366 Networking Fundamentals

Private Network (cont.) 

Since IPv6 addresses are 128 bits long, the theoretical maximum address space if all addresses were used is 2128 addresses. o

This number, when fully expressed is 3.4*1038 or 340,282,366,920,938,463,463,374,607,431,768,211,456.

o

That's about 340 trillion, trillion, trillion addresses.

LESSON

1.1

98-366 Networking Fundamentals

Subnets 

To subnet an IPv6 global address prefix, either hexadecimal or decimal methods are used.



To subnet the IPv6 address space, use subnetting techniques to divide the 16-bit subnet ID field for a 48-bit global.



For global addresses, Internet Assigned Numbers Authority (IANA) or an ISP assigns an IPv6 address prefix in which the first 48 bits are fixed.



Subnetting the subnet ID field for a 48-bit global address prefix requires a two-step procedure: 1.

Determine the number of bits to be used for the subnetting

2.

Enumerate the new subnetted address prefixes

LESSON

1.1

98-366 Networking Fundamentals

Subnets (cont.) 

The number of bits used for subnetting determines the possible number of new subnetted address prefixes that can allocate portions of network based on geographical divisions.



Based on the number of bits used for subnetting, a list of the new subnetted address prefixes can be created with one of these approaches:



1.

Enumerate the new subnetted address prefixes by using hexadecimal representations of the subnet ID and increment.

2.

Enumerate the new subnetted address prefixes by using decimal representations of the subnet ID and increment.

Both methods produce an enumerated list of subnetted address prefixes.

LESSON

1.1

98-366 Networking Fundamentals

Subnet Mask 

A network address plus the bits reserved for identifying the subnetwork



The bits for the network address are all set to 1. o

Example: 11111111.11111111.11110000.00000000.



Called a mask because it can be used to identify the subnet to which an IP address belongs by performing a bitwise AND operation on the mask and the IP address



An IPv6 subnet mask is written in hexadecimal.



A full IPv6 subnet mask uses the same 8-hex-word format as an IPv6 address.



Like IPv4, an IPv6 address has a network portion and a device portion.



Unlike IPv4, an IPv6 address has a dedicated subnetting portion.

LESSON

1.1

98-366 Networking Fundamentals

Why Use IPv6? 

IPv6 has a vastly larger address space than IPv4. o



Results from a 128-bit address (IPv4 uses only 32 bits)

Other benefits of IPv6: o

Stateless address autoconfiguration

o

Multicast and mobility

o

Mandatory network layer security

o

Simplified processing by routers

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review

Complete Student Activity 3.3_B

L EE SS SS O ON N L

31 .. 14

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand Names Resolution

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about:  Domain name resolution 

Name resolution process steps



DNS



WINS

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set 1.

List the host name of 4 of your favorite websites, such as www.microsoft.com.

2.

Visit http://www.hcidata.info/host2ip.htm

3.

Enter the host names, one at a time, and click on the “Find IP Address” button.

4.

Record the IP address for each site.

5.

Describe the process of how the computer finds the IP address from a host name.

6.

Describe the process of how the computer finds a host name from an IP address.

LESSON

1.1

98-366 Networking Fundamentals

Name resolution 





IP address o

Identifies a computer on a network by a unique address

o

A string of four numbers separated by periods is the form of the address (for example, 192.168.1.42)

Domain name o

Used because people remember words better than numbers (for example, www.microsoft.com)

o

The name has to be assigned to a corresponding IP address to access a domain name.

A nameserver is a server that implements a name-service protocol, which maps an identifier to a system-internal, numeric addressing component.

LESSON

1.1

98-366 Networking Fundamentals

How WINS Works By default, when a system is configured to use WINS for its name resolution, it adheres to h-node for name registration. 1.

Checks to see if it is the local machine name

2.

Checks its cache of remote names. Any name that is resolved is placed in a cache where it remains for 10 minutes.

3.

Tries the WINS Server

4.

Tries broadcasting

5.

Checks the LMHOSTS file to determine if the system is configured to use the LMHOSTS file

6.

Tries the HOSTS file and then a DNS, if so configured

LESSON

1.1

98-366 Networking Fundamentals

Domain Name System (DNS) 

The Internet maintains two principal namespaces, the domain name hierarchy and the Internet protocol (IP) address system.



The domain name system maintains the domain namespace and translates between these two namespaces.



Internet name servers implement the domain name system.



A DNS name server is a server that stores the DNS records, such as address (A) records, name server (NS) records, and mail exchanger (MX) records for a domain name.

LESSON

1.1

98-366 Networking Fundamentals 

Resolvers are programs that run on DNS clients and DNS servers and that create queries to extract information from name servers.



Domains define different levels of authority in a hierarchical structure. The top is called the root domain. The DNS namespace on the Internet has the following structure:  The root domain uses a null label, which you write as a single period (.) and is assigned by organization type and by country/region.  Second-level domain contains the domains and names for organizations and countries/regions.  A zone is a contiguous portion of a domain of the DNS namespace whose database records exist and are managed in a particular DNS database file stored on one or multiple DNS servers.

LESSON

1.1

98-366 Networking Fundamentals 

DNS defines two types of name servers:  A primary name server gets the data from locally stored and maintained files. To change a zone, such as adding subdomains or resource records, you change the zone file at the primary name server.

 A secondary name server gets the data across the network from another name server. 

The process of obtaining this zone information (that is, the database file) across the network is referred to as a zone transfer.

LESSON

1.1

98-366 Networking Fundamentals

Host Name Resolution Process Resolves a host name to an IP address before the source host sends the initial IP packet The default order for domain name resolution 1.

2.

3.

Hosts File—There is a file called HOSTS to convert domain names to IP addresses and entries in the HOSTS file dominate mappings that are resolved via a DNS server. Domain Name System —Used for converting domain names to their corresponding IP addresses. The operating system will connect to the DNS server and return to you the IP address for the domain name you queried it with. Netbios—This only applies to Windows machines and will only be used to map names to IP addresses if all previous methods failed. Windows tries NetBIOS name resolution first, then host name resolution.

LESSON

1.1

98-366 Networking Fundamentals

NetBIOS over TCP/IP Name Resolution



b-node—broadcasts are used for both name registration and name resolution.



p-node—uses point-to-point communications with a name server to resolve names.



m-node—first uses b-node and then, if necessary, p-node to resolve names.



h-node—first uses p-node for name queries and then b-node if the name service is unavailable or if the name is not registered in the database.

LESSON

1.1

98-366 Networking Fundamentals

Reverse Lookup of the DNS Namespace •



Within the in-addr.arpa domain, special pointer (PTR) resource records are added to associate the IPv4 addresses to their corresponding host names. To find a host name for the IPv4 address 157.54.200.2, a DNS client sends a DNS query for a PTR record for the name 2.200.54.157.in-addr.arpa.

LESSON

1.1

98-366 Networking Fundamentals 

All the Methods Used by TCP/IP for Windows XP and Windows Server 2003 for Resolving Host Names

LESSON

1.1

98-366 Networking Fundamentals 

DNS name resolution is both iterative and recursive resolution. 1.

The user types in a DNS name into a Web browser, which causes a DNS resolution request to be made from her client machine’s resolver to a local DNS name server.

2.

That name server agrees to resolve the name recursively on behalf of the resolver, but uses iterative requests to accomplish it.

3.

These requests are sent to a DNS root name server, followed in turn by the name servers for “.edu”, “someschool.edu”, and “compsci.someschool.edu”.

4.

The IP address is passed to the local name server and back to the user’s resolver and finally, her Web browser software.

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review Complete Student Activity NetFund_SA_3.4

LESSON

31 . 5 1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand Networking Services

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about: 

Networking services



DHCP



IPsec



Remote access

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set Most schools use DHCP to manage student access to networks. 

What happens when you log on?



List all of the services a computer network provides when using DHCP.



What IP address do you start with?

LESSON

1.1

98-366 Networking Fundamentals

Network Services 

Installed on one server to provide secure shared resources to clients



Common network services include: o

Authentication servers—the process by which the system validates a user’s logon information

o

Directory services—a service on a network that returns mail addresses of other users or enables a user to locate hosts and services

o

DNS—naming system for computers, services, or any resource connected to the Internet or a private network

o

Network file system—distributed file system accessed over a network

o

E-mail

o

Printing

LESSON

1.1

98-366 Networking Fundamentals

DHCP—Dynamic Host Configuration Protocol 

An autoconfiguration protocol used on IP networks



Provides a central way to configure the network settings of all of your networked computers



If your operating system is configured to use DHCP, users just need to plug in the network cable and are ready to go.



DHCP can configure: o



IP address, network mask, DNS address, WINS server address, host name, domain name, gateway address, time server address, print server address

Keeps track of computers connected to the network and prevents two computers from being configured with the same IP address

LESSON

1.1

98-366 Networking Fundamentals

Methods of Allocating IP Addresses 

Dynamic—requires use of DHCP



APIPA—automatically assigns an address as a last resort



Static—manually assigns an address by an administrator



DHCP operations fall into four basic phases: o

IP discovery

o

IP lease offer

o

IP request

o

IP lease acknowledgement

LESSON

1.1

98-366 Networking Fundamentals 

Where a DHCP client and server are on the same subnet, communication is processed through UDP broadcasts.



Where the client and server are on different subnets, IP discovery and IP request messages are sent via UDP broadcasts and IP lease offer and IP lease acknowledgement messages are sent via unicast.

Process: 1.

A DHCP-configured client connects to a network and sends a broadcast query requesting information from a DHCP server.

2.

If the request is valid, the server assigns the client an IP address, a lease (length of time the allocation is valid), and other IP configuration parameters, such as the subnet mask and default gateway.

LESSON

1.1

98-366 Networking Fundamentals

Remote Access 

Communication with a data processing facility from a remote location through a data link



Allows you to extend a network beyond the physical boundaries of the wired network



Available with three models: hosting service, software, and appliance

LESSON

1.1

98-366 Networking Fundamentals

Remote Access Server 

Sometimes called a communication server; is set up to handle users seeking access to network remotely



Associated with a firewall server to ensure security and a router that can forward requests



In transport mode, only the payload (the data you transfer) of the packet is encrypted and/or authenticated



The transport and application layers are always secured by hash, so they cannot be modified in any way.

LESSON

1.1

98-366 Networking Fundamentals

Internet Protocol Security (IPsec) 

A protocol suite for securing Internet protocol (IP) communications by authenticating and encrypting each IP packet of a data stream



Includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session



Protects data flows between a pair of hosts (computer users or servers), between a pair of security gateways (routers or firewalls), or between a security gateway and a host

LESSON

1.1

98-366 Networking Fundamentals

IPsec (continued) 

IPsec can be used for protecting any application traffic across the Internet and is a framework of open standards.



Authentication header (AH) provides connectionless integrity and data origin authentication for IP datagrams and provides protection against replay attacks.



Encapsulating security payload (ESP) is a member of the IPsec protocol suite and provides origin authenticity, integrity, and confidentiality protection of packets.

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review Student Activity NetFund_SA_3.5

LESSON

31 . 6 1

98-366 98-366Networking NetworkingFundamentals Fundamentals

Understand TCP/IP

LESSON

1.1

98-366 Networking Fundamentals

Lesson Overview In this lesson, you will learn about: TCP/IP

Ping

Tracert

Pathping

Telnet

Ipconfig

Netstat

Protocols

Reserved addresses Local loopback IP

LESSON

1.1

98-366 Networking Fundamentals

Anticipatory Set Experiment with ping and tracert. 1.

From the start menu, go to the Run (Win XP) or Search (Win7) command and type cmd. This brings up a DOS command window.

2.

Type ping www.microsoft.com

3.

Ping a few of your favorite sites (www.facebook.com, www.bing.com, www.wikipedia.org , etc.).

4.

Now ping a few geographically close websites (local government, local TV station, local university, etc.).

5.

Record the average times to see which "roundtrips" are the fastest.

6.

Now experiment with tracert using the same urls.

7.

Summarize the results.

8.

Summarize your understanding of ping and tracert.

LESSON

1.1

98-366 Networking Fundamentals

Internet Protocol Suite 

Two original components o

TCP – Transmission Control Protocol

o

IP – Internet Protocol



TCP operates at a higher level, concerned only with the two end systems such as the Web browser and a Web server.



IP handles lower-level transmissions from computer to computer as a message makes its way across the Internet.

LESSON

1.1

98-366 Networking Fundamentals

TCP 

Provides a communication service between an application and the IP



Provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer



Controls segment size, flow control, data exchange rate



Keeps track of the individual units of data transmission, called segments, that a message is divided into for routing through the network



Applications include e-mail and file transfer, and the Web.

LESSON

1.1

98-366 Networking Fundamentals

IP 

Handles the actual delivery of the data



Works by exchanging pieces of information called packets



For example, when an HTML file is sent from a Web server, the TCP software layer of that server divides the sequence of bytes of the file into segments and forwards them individually to the IP software layer (Internet Layer).



The Internet layer encapsulates each TCP segment into an IP packet by adding a header that includes (among other data) the destination IP address.

LESSON

1.1

98-366 Networking Fundamentals

IP Packets 



A sequence of bytes consisting of a header and a body o

The header describes the packet's destination and the routers to use for forwarding until it arrives at the final destination.

o

The body contains the data IP it is transmitting.

IP packets can be lost, duplicated, or delivered out of order. o



TCP detects these problems, requests retransmission of lost packets, rearranges out-of-order packets, and helps minimize network congestion.

Individual packets of the same message can be routed on different paths through the network.

LESSON

1.1

98-366 Networking Fundamentals

TCP/IP Stack 

The TCP or UDP transport layer 4 sends packets to IP network layer 3, which adds its own header and delivers a "datagram" to a data link layer 2 protocol.



TCP/IP tools are in layers 7, 6, 5.

LESSON

1.1

98-366 Networking Fundamentals

Port Numbers 

TCP uses port numbers to identify sending and receiving application end-points on a host.



Three basic categories: well-known, registered, and dynamic/private



Some examples include FTP (21), SSH (22), TELNET (23), SMTP (25) and HTTP (80).

LESSON

1.1

98-366 Networking Fundamentals

TCP/IP Tools Ping: Tests if a particular host is reachable across an IP network; measures the round-trip time for packets sent from the local host

LESSON

1.1

98-366 Networking Fundamentals

TCP/IP Tools Netstat: Displays current TCP/IP network connections and protocol statistics

LESSON

1.1

98-366 Networking Fundamentals

TCP/IP Tools Tracert: Shows the route taken by packets across an IP network

LESSON

1.1

98-366 Networking Fundamentals

TCP/IP Tools Ipconfig: Displays all TCP/IP network configuration values and refreshes DHCP and DNS settings /? Command will play all options available with ipconfig

LESSON

1.1

98-366 Networking Fundamentals

TCP/IP Tools Pathping: Displays the degree of packet loss along the path

LESSON

1.1

98-366 Networking Fundamentals

TCP/IP Tools 

Telnet: A terminal emulation program for TCP/IP networks



Local loopback IP: Tests the TCP/IP protocol implementation on a host -special range of addresses (127.0.0.0 to 127.255.255.255) is set aside



Localhost: Translates to the loopback IP address 127.0.0.1 in IPv4 or ::1 in IPv6

LESSON

1.1

98-366 Networking Fundamentals

Lesson Review Student Activity NetFund_SA_3.6